Sciweavers

OTM
2004
Springer
14 years 5 months ago
Domain Ontology as a Resource Providing Adaptivity in eLearning
Abstract. This paper presents a knowledge-based approach to eLearning, where the domain ontology plays central role as a resource structuring the learning content and supporting ...
Galia Angelova, Ognian Kalaydjiev, Albena Strupcha...
OTM
2004
Springer
14 years 5 months ago
Model-Driven Design of Distributed Applications
The objective of the Ph.D. work discussed in this paper is to define a methodology for the design of distributed applications, in line with the ModelDriven Architecture (MDA). An i...
João Paulo A. Almeida
ICDCIT
2004
Springer
14 years 5 months ago
Querying XML Documents from a Relational Database in the Presence of DTDs
Abstract. Many researchers have investigated the problem of storing and querying XML documents using an RDBMS. Two situations are considered in this approach based on whether or no...
Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Fars...
ICDCIT
2004
Springer
14 years 5 months ago
Secure Requirements Elicitation Through Triggered Message Sequence Charts
Abstract. This paper argues for performing information-flow-based security analysis in the first phaseof the software development life cycle itself ie in the requirements elicita...
Arnab Ray, Bikram Sengupta, Rance Cleaveland
ICDCIT
2004
Springer
14 years 5 months ago
Using Schemas to Simplify Access Control for XML Documents
Abstract. Organizations are increasingly using the the eXtensible Markup Language (XML) for document representation and exchange on the Web. To protect an XML document from unautho...
Indrakshi Ray, Marianna Muller
ICDCIT
2004
Springer
14 years 5 months ago
Distributing Key Updates in Secure Dynamic Groups
We focus on the problem of distributing key updates in secure dynamic groups. Due to changes in group membership, the group controller needs to change and distribute the keys used...
Sandeep S. Kulkarni, Bezawada Bruhadeshwar
ICDCIT
2004
Springer
14 years 5 months ago
Vulnerabilities and Threats in Distributed Systems
We discuss research issues and models for vulnerabilities and threats in distributed computing systems. We present four diverse approaches to reducing system vulnerabilities and th...
Bharat K. Bhargava, Leszek Lilien
ICDCIT
2004
Springer
14 years 5 months ago
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important. We propose a coalition based access control model (CBAC...
Vijayalakshmi Atluri, Janice Warner
ICDCIT
2004
Springer
14 years 5 months ago
Generating a Prototype from a UML Model of System Requirements
Xiaoshan Li, Zhiming Liu, Jifeng He, Quan Long